diff for duplicates of <20170109150249.11667-7-mcgrof@kernel.org> diff --git a/a/1.txt b/N1/1.txt index 14234c1..defdb1f 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -24,8 +24,8 @@ foo_fixup Completed initializing pci ! Number of init entries: 1 Initializing kprobes ... -== OK: test_kprobe_0001 within range! -== OK: test_kprobe_0002 not in range as expected! += OK: test_kprobe_0001 within range! += OK: test_kprobe_0002 not in range as expected! Completed initializing kprobes ! Initializing kasan ... Early init for Kasan... @@ -229,8 +229,7 @@ index bc2d9f46cde6..2f2bb1fc0798 100644 + :doc: Linker table provenance and userspace testing Benefits of using Linker tables - =============================== -diff --git a/MAINTAINERS b/MAINTAINERS + ===============diff --git a/MAINTAINERS b/MAINTAINERS index bbf519da3a78..30105cd3edaf 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -720,7 +719,7 @@ index 000000000000..65fb076765f8 + * At least as per nasm (x86/x86_64 only), in the absence of qualifiers the + * defaults are as follows: + * -+ * section .text progbits alloc exec nowrite align=16 ++ * section .text progbits alloc exec nowrite align\x16 + * section .rodata progbits alloc noexec nowrite align=4 + * section .lrodata progbits alloc noexec nowrite align=4 + * section .data progbits alloc noexec write align=4 @@ -912,7 +911,7 @@ index 000000000000..1e64674f6d7d + * + * bool is_empty = LINKTABLE_EMPTY(some_fns); + */ -+#define SECTION_RANGE_EMPTY(name) (SECTION_RANGE_SIZE(name) == 0) ++#define SECTION_RANGE_EMPTY(name) (SECTION_RANGE_SIZE(name) = 0) + +/** + * SECTION_RANGE_ADDR_WITHIN - returns true if address is in the section range @@ -1415,7 +1414,7 @@ index 000000000000..64b864949a02 + * + * bool is_empty = LINKTABLE_EMPTY(frobnicator_fns); + */ -+#define LINKTABLE_EMPTY(name) (LINKTABLE_SIZE(name) == 0) ++#define LINKTABLE_EMPTY(name) (LINKTABLE_SIZE(name) = 0) + +/** + * LINKTABLE_ADDR_WITHIN - returns true if address is in the linker table @@ -1845,8 +1844,7 @@ index 000000000000..9d4e6fb0d176 +include $(srctree)/tools/build/Makefile.include + +ifeq ($(V),1) -+ Q= -+ NQ=@true ++ Q+ NQ=@true +else + Q=@ + NQ=@echo @@ -2000,7 +1998,7 @@ index 000000000000..729241f9e4c4 +++ b/tools/linker-tables/README @@ -0,0 +1,114 @@ +Linux linker table userspace sandbox -+==================================== ++================== + +This is a userspace sandbox to allow easy experimentation and +test extensions with linker tables. It tries to mimic the Linux @@ -2015,8 +2013,7 @@ index 000000000000..729241f9e4c4 +application. + +History -+======= -+ ++===+ +This was hacked on first in an external repository, that tree has +the full set of history of how this work came about. Refer to that +tree for more details if you are interested in the logic used for @@ -2028,8 +2025,7 @@ index 000000000000..729241f9e4c4 +is kept in sync with the kernel. + +Compile -+======= -+ ++===+ +Run: + make + @@ -2042,8 +2038,7 @@ index 000000000000..729241f9e4c4 + make OUTPUT=/tmp/path/ clean + +Supported architectures -+======================= -+ ++===========+ +x86_64 + +Currently only x86_64 is supported for the demo. It should be @@ -2058,8 +2053,7 @@ index 000000000000..729241f9e4c4 +file over. + +x86 Simulated boots -+=================== -+ ++=========+ +This programs simulates boot on both bare metal and with the +Xen PV entry on x86. + @@ -2072,7 +2066,7 @@ index 000000000000..729241f9e4c4 +./demo -x + +Testing new features -+==================== ++========== + +A copy of each kernel header file is maintained in tools/include/, +as well as a respective generated asm file for each sandbox supported @@ -2091,8 +2085,7 @@ index 000000000000..729241f9e4c4 +each respective tools/linker-tables/arch/$(ARCH)/include/asm/. + +Features evaluation -+=================== -+ ++=========+ +This lists features currently being evaluated in the sandbox, not yet +present upstream. These make use of the existing set of header files +without modification. @@ -2674,15 +2667,15 @@ index 000000000000..c4e42beae55b +{ + if (SECTION_RANGE_ADDR_WITHIN(kprobes, addr)) + if (should_match) -+ pr_info("== OK: %s within range!\n", test); ++ pr_info("= OK: %s within range!\n", test); + else -+ pr_info("== FAIL: %s should not be in range...\n", ++ pr_info("= FAIL: %s should not be in range...\n", + test); + else + if (should_match) -+ pr_info("== FAIL: %s should be in range...\n", test); ++ pr_info("= FAIL: %s should be in range...\n", test); + else -+ pr_info("== OK: %s not in range as expected!\n", test); ++ pr_info("= OK: %s not in range as expected!\n", test); +} + +void early_init_kprobes(void) diff --git a/a/content_digest b/N1/content_digest index 24f726b..995bbba 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -2,7 +2,7 @@ "ref\020170109150249.11667-1-mcgrof@kernel.org\0" "From\0Luis R. Rodriguez <mcgrof@kernel.org>\0" "Subject\0[PATCH v3 6/6] tools: add userspace linker table sandbox\0" - "Date\0Mon, 9 Jan 2017 07:02:49 -0800\0" + "Date\0Mon, 09 Jan 2017 15:02:49 +0000\0" "To\0hpa@zytor.com" acme@redhat.com tglx@linutronix.de @@ -81,8 +81,8 @@ "Completed initializing pci !\n" "Number of init entries: 1\n" "Initializing kprobes ...\n" - "== OK: test_kprobe_0001 within range!\n" - "== OK: test_kprobe_0002 not in range as expected!\n" + "= OK: test_kprobe_0001 within range!\n" + "= OK: test_kprobe_0002 not in range as expected!\n" "Completed initializing kprobes !\n" "Initializing kasan ...\n" "Early init for Kasan...\n" @@ -286,8 +286,7 @@ "+ :doc: Linker table provenance and userspace testing\n" " \n" " Benefits of using Linker tables\n" - " ===============================\n" - "diff --git a/MAINTAINERS b/MAINTAINERS\n" + " ===============diff --git a/MAINTAINERS b/MAINTAINERS\n" "index bbf519da3a78..30105cd3edaf 100644\n" "--- a/MAINTAINERS\n" "+++ b/MAINTAINERS\n" @@ -777,7 +776,7 @@ "+ * At least as per nasm (x86/x86_64 only), in the absence of qualifiers the\n" "+ * defaults are as follows:\n" "+ *\n" - "+ * section .text progbits alloc exec nowrite align=16\n" + "+ * section .text progbits alloc exec nowrite align\026\n" "+ * section .rodata progbits alloc noexec nowrite align=4\n" "+ * section .lrodata progbits alloc noexec nowrite align=4\n" "+ * section .data progbits alloc noexec write align=4\n" @@ -969,7 +968,7 @@ "+ *\n" "+ * bool is_empty = LINKTABLE_EMPTY(some_fns);\n" "+ */\n" - "+#define SECTION_RANGE_EMPTY(name)\t(SECTION_RANGE_SIZE(name) == 0)\n" + "+#define SECTION_RANGE_EMPTY(name)\t(SECTION_RANGE_SIZE(name) = 0)\n" "+\n" "+/**\n" "+ * SECTION_RANGE_ADDR_WITHIN - returns true if address is in the section range\n" @@ -1472,7 +1471,7 @@ "+ *\n" "+ * bool is_empty = LINKTABLE_EMPTY(frobnicator_fns);\n" "+ */\n" - "+#define LINKTABLE_EMPTY(name)\t(LINKTABLE_SIZE(name) == 0)\n" + "+#define LINKTABLE_EMPTY(name)\t(LINKTABLE_SIZE(name) = 0)\n" "+\n" "+/**\n" "+ * LINKTABLE_ADDR_WITHIN - returns true if address is in the linker table\n" @@ -1902,8 +1901,7 @@ "+include $(srctree)/tools/build/Makefile.include\n" "+\n" "+ifeq ($(V),1)\n" - "+\tQ=\n" - "+\tNQ=@true\n" + "+\tQ+\tNQ=@true\n" "+else\n" "+\tQ=@\n" "+\tNQ=@echo\n" @@ -2057,7 +2055,7 @@ "+++ b/tools/linker-tables/README\n" "@@ -0,0 +1,114 @@\n" "+Linux linker table userspace sandbox\n" - "+====================================\n" + "+==================\n" "+\n" "+This is a userspace sandbox to allow easy experimentation and\n" "+test extensions with linker tables. It tries to mimic the Linux\n" @@ -2072,8 +2070,7 @@ "+application.\n" "+\n" "+History\n" - "+=======\n" - "+\n" + "+===+\n" "+This was hacked on first in an external repository, that tree has\n" "+the full set of history of how this work came about. Refer to that\n" "+tree for more details if you are interested in the logic used for\n" @@ -2085,8 +2082,7 @@ "+is kept in sync with the kernel.\n" "+\n" "+Compile\n" - "+=======\n" - "+\n" + "+===+\n" "+Run:\n" "+\tmake\n" "+\n" @@ -2099,8 +2095,7 @@ "+\tmake OUTPUT=/tmp/path/ clean\n" "+\n" "+Supported architectures\n" - "+=======================\n" - "+\n" + "+===========+\n" "+x86_64\n" "+\n" "+Currently only x86_64 is supported for the demo. It should be\n" @@ -2115,8 +2110,7 @@ "+file over.\n" "+\n" "+x86 Simulated boots\n" - "+===================\n" - "+\n" + "+=========+\n" "+This programs simulates boot on both bare metal and with the\n" "+Xen PV entry on x86.\n" "+\n" @@ -2129,7 +2123,7 @@ "+./demo -x\n" "+\n" "+Testing new features\n" - "+====================\n" + "+==========\n" "+\n" "+A copy of each kernel header file is maintained in tools/include/,\n" "+as well as a respective generated asm file for each sandbox supported\n" @@ -2148,8 +2142,7 @@ "+each respective tools/linker-tables/arch/$(ARCH)/include/asm/.\n" "+\n" "+Features evaluation\n" - "+===================\n" - "+\n" + "+=========+\n" "+This lists features currently being evaluated in the sandbox, not yet\n" "+present upstream. These make use of the existing set of header files\n" "+without modification.\n" @@ -2731,15 +2724,15 @@ "+{\n" "+\tif (SECTION_RANGE_ADDR_WITHIN(kprobes, addr))\n" "+\t\tif (should_match)\n" - "+\t\t\tpr_info(\"== OK: %s within range!\\n\", test);\n" + "+\t\t\tpr_info(\"= OK: %s within range!\\n\", test);\n" "+\t\telse\n" - "+\t\t\tpr_info(\"== FAIL: %s should not be in range...\\n\",\n" + "+\t\t\tpr_info(\"= FAIL: %s should not be in range...\\n\",\n" "+\t\t\t\ttest);\n" "+\telse\n" "+\t\tif (should_match)\n" - "+\t\t\tpr_info(\"== FAIL: %s should be in range...\\n\", test);\n" + "+\t\t\tpr_info(\"= FAIL: %s should be in range...\\n\", test);\n" "+\t\telse\n" - "+\t\t\tpr_info(\"== OK: %s not in range as expected!\\n\", test);\n" + "+\t\t\tpr_info(\"= OK: %s not in range as expected!\\n\", test);\n" "+}\n" "+\n" "+void early_init_kprobes(void)\n" @@ -3974,4 +3967,4 @@ "-- \n" 2.11.0 -31cc67c035506fe9b2994b2b44f1048441e56240b0f93c03efe8840eeb0c80d1 +2825df6d93985a1a85670cad29639767d1a2f65562ce7326284c24088fc0455f
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.